Filtrer vos résultats
- 123
- 88
- 1
- 109
- 48
- 25
- 12
- 11
- 5
- 1
- 1
- 10
- 1
- 210
- 9
- 2
- 1
- 43
- 26
- 2
- 4
- 10
- 10
- 10
- 5
- 18
- 14
- 6
- 12
- 13
- 10
- 14
- 16
- 12
- 18
- 18
- 15
- 3
- 1
- 1
- 168
- 44
- 205
- 19
- 11
- 10
- 6
- 5
- 5
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 212
- 35
- 21
- 15
- 15
- 12
- 12
- 9
- 8
- 8
- 7
- 6
- 6
- 6
- 6
- 6
- 6
- 5
- 5
- 5
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
212 résultats
|
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and SolutionsIEEE Internet of Things Journal, 2019, 6 (3), pp.4556-4560. ⟨10.1109/JIOT.2019.2921235⟩
Article dans une revue
hal-02315884v1
|
||
|
Overcoming DNSSEC performance issues with DHT-based architecturesIM '13 : IFIP/IEEE International Symposium on Integrated Network Management, May 2013, Ghent, Belgium. pp.816-819
Communication dans un congrès
hal-00860147v1
|
||
|
PAbAC: a Privacy preserving Attribute based framework for fine grained Access Control in cloudsSECRYPT 2016 : 13th International Conference on Security and Cryptography, Jul 2016, Lisbon, Portugal. pp.133 - 146, ⟨10.5220/0005968201330146⟩
Communication dans un congrès
hal-01391253v1
|
||
Privacy management and protection of personal dataDigital identity management, ISTE Press; Elsevier, pp.137 - 205, 2015, Information systems, web and pervasive computing, 978-1-7854-8004-1. ⟨10.1016/B978-1-78548-004-1.50004-3⟩
Chapitre d'ouvrage
hal-01272029v1
|
|||
A secure Peer-to-Peer backup systemNOTERE 2008 : 8ème conférence internationale sur les nouvelles technologies de la répartition, Jun 2008, Lyon, France. pp.125 - 134, ⟨10.1145/1416729.1416751⟩
Communication dans un congrès
hal-01379960v1
|
|||
|
Technical enforcement of european privacy legislation: an access control approachNTMS 2012 : 5th IFIP International Conference on New Technologies, Mobility and Security , May 2012, Istanbul, Turkey. pp.1 - 7, ⟨10.1109/NTMS.2012.6208724⟩
Communication dans un congrès
hal-01300733v1
|
||
Security, and privacy in emerging wireless networks : security and communication networks journalWiley; Hindawi Limited, 2017, Security and Communication Networks Journal, Security and Communication Networks Journal
Ouvrages
hal-01682207v1
|
|||
Data security and privacy preservation in cloud storage environments based on cryptographic mechanismsComputer Communications, 2017, 111, pp.120 - 141. ⟨10.1016/j.comcom.2017.07.006⟩
Article dans une revue
hal-01576979v1
|
|||
|
Sécurité dans les réseaux de capteurs sans fil : conception et implémentation[Rapport de recherche] Dépt. Logiciels-Réseaux (Institut Mines-Télécom-Télécom SudParis); Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (Institut Mines-Télécom-Télécom SudParis-CNRS). 2008, pp.55
Rapport
hal-01373430v1
|
||
|
Prov-trust: towards a trustworthy SGX-based data provenance system17th International Conference on Security and Cryptography (SECRYPT), Jul 2020, Lieusaint - Paris, France. pp.225-237, ⟨10.5220/0009889302250237⟩
Communication dans un congrès
hal-03991163v1
|
||
|
Novel lightweight signcryption-based key distribution mechanisms for MIKEY10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.19-34, ⟨10.1007/978-3-319-45931-8_2⟩
Communication dans un congrès
hal-01391308v1
|
||
|
SPOT+: secure and privacy-preserving proximity-tracing protocol with efficient verification over multiple contact informationCommunications in Computer and Information Science, 2023, Communications in Computer and Information Science, 1849, pp.1-19. ⟨10.1007/978-3-031-45137-9_1⟩
Article dans une revue
hal-04227767v1
|
||
|
An EAP-EHash authentication method adapted to resource constrained terminalsAnnals of Telecommunications - annales des télécommunications, 2009, 65 (5), pp.271 - 284. ⟨10.1007/s12243-009-0135-9⟩
Article dans une revue
hal-00506549v1
|
||
|
Questioning the security and efficiency of the ESIoT approachWISEC 2018: 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Jun 2018, Stockholm, Sweden. pp.202 - 207, ⟨10.1145/3212480.3212491⟩
Communication dans un congrès
hal-01850383v1
|
||
|
Building trust through risk management in computer scienceClaire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.48-59, 2018, 978-2-9557308-6-7
Chapitre d'ouvrage
hal-02516151v1
|
||
|
Is blockchain a trustworthy technology?Claire Levallois-Barth. Signs of trust – The impact of seals on personal data management, Paris, Handbook 2 Chair Values and Policies of Personal Information, Coordinated by Claire Levallois-Barth, Institut Mines-Télécom, pp.180-197, 2018, 978-2-9557308-6-7
Chapitre d'ouvrage
hal-02516126v1
|
||
PCS, a privacy-preserving certification schemeDPM 2017 : 12th International Workshop on Data Privacy Management, Sep 2017, Oslo, Norway
Communication dans un congrès
hal-01702450v1
|
|||
Key management in wireless sensor networksWireless and mobile network security, ISTE / Wiley, pp.613 - 648, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch16⟩
Chapitre d'ouvrage
hal-00472923v1
|
|||
|
H2BSAP : a Hop-by-Hop broadcast source authentication protocol for WSN to mitigate DoS attacksICCS 2008 : 11th IEEE International Conference on Communication Systems, Nov 2008, Guangzhou, China. pp.1197 - 1203 ⟨10.1109/ICCS.2008.4737372⟩
Communication dans un congrès
hal-01327378v1
|
||
|
A validated privacy-utility preserving recommendation system with local differential privacy2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE), Oct 2021, Shenyang, France. pp.118-127, ⟨10.1109/BigDataSE53435.2021.00026⟩
Communication dans un congrès
hal-03754064v1
|
||
|
Toward a new ad hoc node design for secure service deployment over ad hoc networkMWNS 2008 : Workshop on Mobile and Wireless Networks Security, May 2008, Singapore, Singapore. pp.1 - 11, ⟨10.1142/9789812833266_0001⟩
Communication dans un congrès
hal-01355075v1
|
||
Mécanismes de sécurité fondamentauxLa sécurité dans les réseaux sans fil et mobiles. 1, Concepts fondamentaux, Hermes Science : Lavoisier, pp.89 - 147, 2007, IC2 : information, commande, communication. Réseaux et télécoms, 978-2-7462-1697-6
Chapitre d'ouvrage
hal-01328102v1
|
|||
Les identités numériquesLa gestion des identités numériques, ISTE Edition, pp.19 - 90, 2015, Systèmes d'information, web et informatique ubiquitaire, 978-1-78405-056-6
Chapitre d'ouvrage
hal-01263060v1
|
|||
La gestion des identités numériquesISTE. pp.340, 2014, à paraître
Ouvrages
hal-01126448v1
|
|||
|
Authorized keyword search over outsourced encrypted data in cloud environmentIEEE Transactions on Cloud Computing, 2022, 10 (1), pp.216-233. ⟨10.1109/tcc.2019.2931896⟩
Article dans une revue
hal-03991044v1
|
||
|
CoRA: a scalable Collective Remote Attestation protocol for sensor networksICISSP 2020: 6th International Conference on Information Systems Security and Privacy, Feb 2020, Valletta, Malta. pp.84-95, ⟨10.5220/0008962700840095⟩
Communication dans un congrès
hal-03024074v1
|
||
Privacy-by-design in intelligent infrastructuresDeep diving into data protection: 1979-2019: celebrating 40 years of research on privacy data protection at the CRIDS, 170 (51), Collection du CRIDS, pp.309-343, 2021, 9782807926493
Chapitre d'ouvrage
hal-04331489v1
|
|||
|
A new protocol for securing wireless sensor networks against nodes replication attacks3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007), Oct 2007, White Plains, Ny, United States. pp.59 - ⟨10.1109/WIMOB.2007.4390853⟩
Communication dans un congrès
hal-01355352v1
|
||
Wireless sensor network securityWireless and mobile networks security, ISTE/John Wiley & Sons, pp.565 - 612, 2009, 978-1-84821-117-9. ⟨10.1002/9780470611883.ch15⟩
Chapitre d'ouvrage
hal-01359532v1
|
|||
La confiance en informatique par la gestion du risqueSignes de confiance : l’impact des labels sur la gestion des données personnelles, Institut Mines-Télécom, pp.47 - 62, 2018, 978-2-9557308-4-3
Chapitre d'ouvrage
hal-01773953v1
|